Annual Computer Security Applications Conference (ACSAC) 2017

Full Program »

Automated analysis of Secure Internet of Things Protocols

Formal security analysis has proven to be a useful tool for tracking modifications in communication protocols in an \emph{automated} manner, where full security analysis of revisions requires minimum efforts. In this paper, we formally analyzed prominent IoT protocols and uncovered many critical challenges in practical IoT settings. We address these challenges by using formal symbolic modeling of such protocols under various adversaries and security goals. Further this paper extends formal analysis to cryptographic Denial-of-Service (DoS) and demonstrates that a vast majority of IoT protocols are vulnerable to such resource exhaustion attacks. We present a cryptographic DoS attack countermeasure that can be generally used in many IoT protocols. Our study of prominent IoT protocols such as CoAP and MQTT shows the benefits of our approach.

Jun Young Kim
The University of New South Wales and Data61 CSIRO
Australia

Ralph Holz
The University of Sydney
Australia

Wen Hu
The University of New South Wales and Data61 CSIRO
Australia

Sanjay Jha
The University of New South Wales and Data61 CSIRO
Australia

 

Powered by OpenConf®
Copyright©2002-2017 Zakon Group LLC